Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
cybersecurity knowledge requirements (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
Ă—
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(1/185)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
185
1.
cybersecurity knowledge requirements
2.
automotive cybersecurity
3.
cybersecurity
4.
cybersecurity (CS)
5.
cybersecurity awareness
6.
cybersecurity behaviors
7.
cybersecurity breach
8.
cybersecurity components
9.
cybersecurity education
10.
cybersecurity exercises
11.
cybersecurity gender balance
12.
cybersecurity governance
13.
cybersecurity in shipping
14.
cybersecurity incident response
15.
cybersecurity law
16.
cybersecurity market demand
17.
cybersecurity maturity tool development for schools
18.
cybersecurity policy
19.
cybersecurity practical training
20.
cybersecurity simulations
21.
cybersecurity skills gap
22.
cybersecurity standards
23.
cybersecurity test bed
24.
cybersecurity testing
25.
cybersecurity training
26.
cybersecurity workforce development
27.
cybersecurity vulnerability
28.
EU cybersecurity policy
29.
European cybersecurity capacity building
30.
European Cybersecurity Skills Framework (ECSF)
31.
European Union Agency for Cybersecurity (ENISA)
32.
human factor of cybersecurity
33.
human factors in cybersecurity
34.
maritime cybersecurity
35.
maritime cybersecurity certification teaching
36.
organising cybersecurity exercises
37.
port cybersecurity
38.
responsibility/penalty for a cybersecurity breach
39.
set of possible cybersecurity breaches
40.
energy performance minimum requirements
41.
functional requirements
42.
grid connection requirements
43.
industrial IT requirements
44.
isolation requirements
45.
min. requirements
46.
minimum requirements
47.
national requirements
48.
nZEB requirements
49.
nutrient requirements
50.
ontology requirements
51.
requirements
52.
requirements bazaar
53.
requirements elicitation
54.
requirements engineering
55.
requirements feedback
56.
requirements gathering
57.
requirements modelling
58.
security requirements
59.
security requirements engineering
60.
User Requirements
61.
absolutist knowledge
62.
Actionable knowledge
63.
collaborative knowledge production
64.
computerised knowledge work
65.
customer knowledge sharing
66.
data mining and knowledge discovery
67.
differentiated knowledge base
68.
diffusion of knowledge
69.
diffusion of knowledge
70.
expert knowledge
71.
global knowledge warfare
72.
hiding knowledge
73.
inclusiv knowledge management
74.
Indigenous knowledge systems
75.
integrated and networked knowledge generating systems
76.
international knowledge transfer
77.
knowledge
78.
knowledge absorptive capacity
79.
knowledge abstraction
80.
knowledge and innovation
81.
knowledge and skills
82.
knowledge base
83.
knowledge based economy
84.
knowledge based manufacturing
85.
knowledge based systems
86.
knowledge bases
87.
knowledge brokering
88.
knowledge challenges
89.
knowledge contribution
90.
knowledge creation
91.
knowledge diffusion
92.
knowledge discovery
93.
knowledge discovery and data mining
94.
knowledge discovery in databases
95.
knowledge distillation
96.
knowledge driven manufacturing
97.
knowledge economy
98.
knowledge employees
99.
knowledge engineering
100.
knowledge exchange
101.
knowledge exploitation
102.
knowledge extraction
103.
knowledge flows
104.
knowledge fusion
105.
knowledge gathering
106.
knowledge generation
107.
knowledge graph
108.
knowledge graph embeddings
109.
knowledge hiding
110.
knowledge hiding behavior
111.
knowledge intensive enterprises
112.
knowledge leakage
113.
knowledge loss
114.
knowledge management
115.
knowledge management (KM)
116.
knowledge management in production
117.
Knowledge management system
118.
knowledge management systems (KMS)
119.
knowledge map
120.
knowledge network
121.
knowledge networks
122.
knowledge of brand origins
123.
knowledge overload
124.
knowledge perception
125.
knowledge processing
126.
knowledge recovery
127.
knowledge representation
128.
knowledge retention
129.
knowledge retention and higher education
130.
Knowledge retrieval
131.
knowledge risk
132.
knowledge risk management
133.
knowledge risk management (KRM)
134.
knowledge risk management in banking
135.
knowledge risk management in construction
136.
knowledge risk management in SMEs
137.
knowledge risks
138.
knowledge risks in health-care organizations
139.
knowledge sharing
140.
knowledge sourcing
141.
knowledge systems
142.
knowledge transfer
143.
knowledge translation
144.
knowledge warfare
145.
knowledge withholding
146.
knowledge workers
147.
knowledge-based design
148.
knowledge-based economy
149.
knowledge-based manufacturing
150.
knowledge-based system
151.
knowledge-based systems
152.
knowledge-basedfirms
153.
knowledge-inquiry
154.
knowledge-intensive business service (KIBS)
155.
knowledge-intensive business services
156.
knowledge-intensive service activities (KISA)
157.
knowledge-intensivefirms
158.
knowledge-management
159.
Local ecological knowledge
160.
logistics knowledge areas
161.
management knowledge
162.
nursing knowledge
163.
operational knowledge risk
164.
organisational knowledge
165.
organizations knowledge
166.
personal health knowledge graph
167.
personal knowledge management
168.
policy-relevant knowledge
169.
responsible knowledge
170.
responsible knowledge management
171.
risks knowledge risks
172.
safety knowledge
173.
scientific knowledge
174.
shared knowledge authentication
175.
symbolic knowledge
176.
symbolic knowledge in Husserlian pure logic
177.
zero-knowledge
178.
zero-knowledge proof
179.
Zero-knowledge proofs
180.
task knowledge patterns
181.
teachers’ knowledge base
182.
Traditional ecological knowledge
183.
traditional knowledge
184.
transfer of knowledge
185.
withholding knowledge
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT